What restricts a tenant’s access to a specific group of object buckets in a software-defined storage environment?
- A . Availability zone
- B . Retention quotas
- C . Namespace
- D . Erasure coding
Which data archiving component scans primary storage to find the files that meet the archiving policy?
- A . Archive storage
- B . Archive database server
- C . Archive agent
- D . Archive stub file
A company plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is expected to generate 4500 IOPS with a typical I/O size of 4 KB. The capacity of each available disk drive is 250 GB. In addition, the maximum number of IOPS a drive can perform at with a 70% utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and performance requirements for a RAID 0 configuration?
- A . 8
- B . 40
- C . 50
- D . 70
What accurately describes the seek time of a disk drive?
- A . Time taken to position the read/write head over the correct track
- B . Time taken by the platter to position the data under the read/write head
- C . Time taken to read a block of data from the platter
- D . Time taken by the controller to service an I/O from the application
What is an accurate statement about a virtual tape library?
- A . Legacy backup software can be used without additional modules or changes
- B . Portability of physical tapes tooffsite locations is supported
- C . Only sequential data access for both backup and recovery is supported
- D . Regular maintenance tasks associated with a physical tape drive are required
If a company has experienced a passive attack on its IT infrastructure, how is the company’s security impacted?
- A . Access to services is denied.
- B . Availability of data is affected.
- C . Information privacy is compromised.
- D . Data is altered by an unauthorized user.
A Fibre Channel switch has eight ports and all ports must be operational 24 hours 7 days.
However, a failure of Port 5 occurs on a particular week as follows:
– Monday = 11 AM to 3 PM
– Thursday = 6 AM to 11 AM
– Saturday = 11 AM to 4 PM
What is the availability of Port 5 in that week?
- A . 91.6%
- B . 94.6%
- C . 95%
- D . 90%
What does the "variability" characteristic of big data signify?
- A . Importance in obtaining the right information from data at all possible contexts
- B . Cost-effectiveness and business value obtained from massive volumes of data
- C . Diversity in the formats and types of data generated from various sources
- D . mportance in the quality of data gathered from a number of sources
What is an accurate statement regarding virtual LANs?
- A . Supports Fibre Channel network transport data security
- B . Supports one or more logical L ANS operating over a single physical LAN
- C . Provides hardware level connectivity and maintains physical L AN transport paths
- D . Provides software level connectivity and maintains physical LAN transport paths
In a __________ cloud deployment model, cloud resources are owned, operated, and maintained by a business.
- A . Public
- B . Private
- C . Hybrid
- D . Community
In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link.
Which security mechanism should the administrator use?
- A . Port type locking
- B . Port binding
- C . Persistent port disable
- D . Fabric binding
What is an accurate statement about a fabric-provided MAC address (FPMA) used in an FCoE SAN?
- A . FCoE switches provide MAC addresses to VN_Ports during node login
- B . FC switches provide MAC addresses to VE_Ports dynamically during discovery
- C . Compute systems provide MAC addresses to the VF_Ports on FCoE switches
- D . Both VF_Ports and VE_Ports obtain MAC addresses from FC switches
Which technology decouples the OS, applications, and user state from a physical compute system?
- A . Application virtualization
- B . Storage virtualization
- C . Thin client virtualization
- D . Desktop virtualization
What is an accurate statement about a virtual desktop infrastructure?
- A . Each user is provided a dedicated desktop VM with its own operating system and applications
- B . Operating system and applications hosted on a client system are shared by multiple users
- C . Each user has an individual desktop session on the remote compute system in which applications execute
- D . Operating system and applications on the remote desktop are downloaded on the client for local execution
What is an advantage of performing capacity monitoring in a storage infrastructure environment?
- A . Automatically identifying configuration changes to the storage infrastructure elements
- B . Rapidly identifying component failures that may lead to storage unavailability
- C . Efficiently tracking unauthorized access to the storage infrastructure elements
- D . Proactively preventing service outages due to the lack of storage space
What is an accurate statement about the function of an archiving server?
- A . Enables the ability to configure policies for archiving data
- B . Installs agentson the archiving storage device
- C . Scans the data that can bearchived on application servers
- D . Creates stub files on an archiving storage device
What information is available in a capacity planning report for storage infrastructure?
- A . number of units of storage available, used and the cost
- B . current and historic information about the utilization of storage, file systems, and ports
- C . equipment purchase dates, licenses, lease status, and maintenance records
- D . current and historical performance information about IT components and operations
What accurately describes hypervisor-based continuous data protection?
- A . Virtual appliance is running on a hypervisor.
- B . Journal is stored in a virtual machine.
- C . Virtual appliance runs on a storage system.
- D . Replica volumes are created in the hypervisor.
An organization is planning to secure the connection between the data center and cloud while performing data backup and replication.
Which security control mechanism will help organization to achieve the desired security?
- A . ldentity and Access management
- B . Intrusion Detection and Prevention
- C . Firewall
- D . Virtual Private Network
An organization plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is expected to generate 9800 IOPS with a typical I/O size of 4 KB.
The capacity of each available disk drive is 250 GB. The maximum number of IOPS a drive can perform at with 70 percent utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and performance requirements given a RAID 0 configuration?
- A . 8
- B . 70
- C . 110
- D . 140
Which type of storage device does the “X” represent in the exhibit?
- A . Object-based
- B . Block-based
- C . File-based
- D . Unified-based
What are the essential components of an object in an object-based storage system?
- A . File path, object ID, data, and filename
- B . Object ID, metadata, file path, and LUN ID
- C . Data, user-defined attributes, metadata, and object ID
- D . LUN ID, data, object ID, and user-defined attributes
Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?
- A . Fabric controller
- B . Fabric login server
- C . Name server
- D . Fabric management server
What accurately describes an attack surface in an IT infrastructure?
- A . Various entry points that can be used to launch an attack
- B . Series of steps that must be followed in order to complete an attack
- C . Amount of effort required to exploit a vulnerability in the infrastructure
- D . Process of identifying the system components under attack
Which compute system component enables dynamic extension of file system capacity and efficient storage management?
- A . Logical Unit Number
- B . Logical Unit Number Masking
- C . Logical Volume Manager
- D . Virtual Memory Manager
What is an advantage of performing incremental backups compared to cumulative backups for the same data?
- A . Requires more time to perform data backup
- B . Storage capacity needed for backups is significantly reduced
- C . Requires more storage capacity for backup
- D . Reduces restore time but requires a maximum of two copies
Which capability is provided by software-defined networking?
- A . Ability to combine both data plane and control plane functions on a single physical network component
- B . A single control point to the entire network infrastructure enabling policy-based network management
- C . Ability to automatically create application programming interfaces for centralized management
- D . A single self-contained package with integrated hardware and software components
Which data center characteristic ensures that data is stored and retrieved exactly as it was received?
- A . Data integrity
- B . Security
- C . Scalability
- D . Manageability
What specialized replication technique enables moving data between storage systems within a data center, between data centers, and between the data center and the cloud?
- A . Data deduplication
- B . Data migration
- C . Data backup
- D . Data archiving
Which Dell EMC product provides a software-defined platform that supports both block and file storage services?
- A . XtremIO
- B . PowerMax
- C . FAST VP
- D . VPLEX
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.
Which IDPS technique uses a database that contains known attack patterns?
- A . Role-based
- B . Profile-based
- C . Signature-based
- D . Anomaly-based
Which data protection solution provides the ability to select a backup technology based on demand?
- A . Agent-Based backup
- B . Cloud-Based backup
- C . File-Based backup
- D . Image-Based backup
Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?
- A . Data link
- B . Presentation
- C . Session
- D . Application
Which cloud service model provides the highest level of control over operating systems, applications, and storage?
- A . Platform as a Service (PaaS)
- B . Software as a Service (SaaS)
- C . Infrastructure as a Service (IaaS)
- D . Function as a Service (FaaS)
What is a characteristic of an FC-AL implementation?
- A . Devices can be added and removed dynamically without any impact
- B . Supports connectivity up to 15 million nodes
- C . Requires at least one connectivity device
- D . Reserves one address for connecting an FC-SW port
In a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?
- A . Hadoop Distributed File System (HDFS)
- B . New Technology File System (NTFS)
- C . Common Internet File System (CIFS)
- D . Network File System (NFS)
What is the purpose of monitoring capacity in a storage infrastructure?
- A . Tracking the amount of storage infrastructure resources used and available
- B . Evaluating utilization of components and identifying bottlenecks
- C . Tracking configuration changes to the storage infrastructure elements
- D . Identifying component failures that may lead to service unavailability
What is used to implement a fully functional SAN?
- A . IPFC
- B . iSCSI
- C . VXLAN
- D . FCIP
Which product provides an organization with the power to search and analyze vast amounts of data in one place and helps administrators to discover suspicious event trends?
- A . Dell InTrust
- B . Dell Change Auditor
- C . VMware AppDefense
- D . VMware AirWatch
Based on the exhibit, which type of storage does the “X” represent?
- A . File-based
- B . Block-based
- C . Object-based
- D . Unified-based
Which three parameters define information availability in a modern data center environment?
- A . Reliability – Accessibility – Timeliness
- B . Capacity – Availability – Security
- C . Confidentiality – Integrity – Availability
- D . Reliability – Integrity – Performance
Which type of Fibre Channel (FC) ports do “X” and “Y” represent in the graphic?
- A . X is an E_Port and Y is an N_Port
- B . X is an F_Port and Y is an F_Port
- C . X is an N_Port and Y is an E_Port
- D . X is an N_Port and Y is an N_Port
Which operation is performed by a scale-out NAS cluster when clients send data to the cluster?
- A . Data is divided and stored on multiple nodes in parallel
- B . Data is consolidated into a block and then stored on the NAS head
- C . Data is evenly distributed to every file system in the cluster
- D . NAS file system and cluster grow dynamically to store the data
What is an advantage of deploying a purpose-built, disk-based backup appliance in a data center environment?
- A . Eliminate the need for performing source-based deduplication.
- B . Convert the capital expenditure to an operational expenditure.
- C . Lower the recovery time objective of an organization.
- D . Retain the fixed content for longer periods in the data center.
An institution has made the decision to exit a client relationship due to anti-money laundering concerns. Prior to starting the close out process, the institution receives a written request from a law enforcement agency to keep the account open. The client is the subject of an ongoing investigation and law enforcement wants the institution to continue to monitor the account and report any suspicious activity.
What is primary consideration the institution should keep in mind when deciding whether to agree to this request?
- A . The anticipated cost of complying with the law enforcement request
- B . The number of suspicious transaction reports previously filed on the client
- C . The fact that the institution has a solid record in complying with law enforcement requests
- D . Whether the institution can continue to meet its regulatory obligations with the accounts open
Which functionality is provided by a process login in a Fibre Channel (FC) SAN environment?
- A . Exchanges service relevant parameters between an N_port and an N_port
- B . Establishes a connection to the fabric between an N_port and an F_port
- C . Exchange ULP-related parameters between two N_ports
- D . Establishes a session that occurs between two E_ports
Which logical components are required in compute systems?
- A . Operating system
Deduplicating file system
RAID LUN manager
Device drivers - B . Operating system
File system
RAID LUN manager
Device drivers - C . Operating system
File system
Logical volume manager
Device drivers - D . Operating system
Deduplicating File system
Logical volume manager
Device drivers
A company’s Finance department needs 200 GB of storage for their business applications. A LUN is created with 200 GB and RAID 1 is configured to support the applications.
If the cost of storage per GB is $2, what is the chargeback cost to the department for application storage?
- A . $ 200
- B . $ 400
- C . $ 800
- D . $ 1500
What happens when a write request to a valid page is received in a solid-state drive?
- A . Requested page is electrically erased and the write continues with the erased page
- B . Requested page is overwritten by the new page
- C . Requested page is marked invalid and the write continues with an available empty page
- D . Write request is queued until the requested page is erased
An organization wants to use an application for their business communication. However, they do not have the skills or the time to deploy and manage an application in-house.
Which recommended cloud service model will meet their requirement?
- A . Infrastructure as a Service
- B . Database as a Service
- C . Software as a Service
- D . Platform as a Service
Which type of fabric topology does the exhibit represent?
- A . Full mesh
- B . Partial mesh
- C . Single core-edge
- D . Dual core-edge
What are the components of an intelligent storage system? (Choose two)
- A . RAID Controllers
- B . HTTP Protocols
- C . Cache Memory
- D . Wireless Adapters
What is an accurate statement about three-way NDMP backup in a NAS environment?
- A . Backup device can be shared among multiple NAS heads
- B . Each NAS head should have a dedicated backup device
- C . Backup data traverses at least three NAS heads before reaching the backup device
- D . Backup is performed only when three or more NAS heads are present
Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?
- A . Fabric binding
- B . Zoning
- C . Concatenating metaLUNs
- D . LUN masking
Which lossless Ethernet functionality helps Converged Enhanced Ethernet (CEE) devices to convey and configure their features with the other CEE devices in the network?
- A . Data center bridging exchange protocol
- B . Enhanced transmission selection
- C . Priority-based flow control
- D . Congestion notification
To improve performance, which EMC product allows a PCIe flash card to be deployed in a compute system?
- A . XtremSF
- B . XtremCache
- C . ScaleIO
- D . XtremIO
In which scenarios is FCIP most beneficial? (Choose two)
- A . Connecting isolated SANs over long distances
- B . High-performance, low-latency environments
- C . Local data center connectivity
- D . Connecting SANs over an IP network
A Fibre Channel switch has eight ports and all ports must be operational from 8 AM to 8 PM, Monday through Friday.
However, a failure of Port 2 occurs on a particular week as follows:
– Monday = 10 AM to 12 PM
– Wednesday = 4 PM to 9 PM
– Thursday = 4 PM to 7 PM
– Friday = 3 PM to 6 PM
– Saturday = 9 AM to 1 PM
What is the availability of Port 2 in that week?
- A . 70%
- B . 71.6%
- C . 78.3%
- D . 80%
What is the effect of implementing link aggregation in an FC SAN environment?
- A . Distributes network traffic over ISLs that ensures even ISL utilization
- B . Yields higher throughput by combing two parallel ISLs into a single physical ISL
- C . Saves bandwidth by restricting traffic to a specific potentially congested ISL
- D . Improves ISL utilization by increasing network traffic on a specific ISL
What accurately describes an object-based storage device (OSD)?
- A . One object can be placed inside another object
- B . Objects are created based on the name and location of the file
- C . Objects exist at the same level in the address space
- D . Numerous objects can be stored in a single namespace
Under the IaaS model, which elements are managed by the provider?
- A . Applications
Data
OS - B . Applications
Middleware
Runtime - C . Data
Servers
Networking - D . Virtualization
Servers
Networking
Which storage management function ensures that the services and service levels are delivered per SLAs?
- A . Infrastructure discovery management
- B . Portfolio management
- C . Financial management
- D . Operation management
What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?
What is a benefit of using a purpose-build NAS solution vs. general purpose file servers?
- A . provides more efficient object sharing across Windows and Linux users
- B . provides more efficient file sharing across Windows and Linux users
- C . provides higher compute security and efficient file sharing across Windows and Linux users
- D . provides higher network security and efficient object sharing across Windows and Linux users
A customer has a requirement to perform a backup each night. However, the customer has a limited amount of time for backups to run on week nights, Monday through Friday evenings.
Which backup granularity type is recommended to meet the backup window for those nights?
- A . Incremental
- B . Cumulative
- C . Full
- D . Differential
To authenticate a user using OpenID authentication control, what are the correct sequence of steps?
What accurately describes the flow control mechanism in an FC SAN?
- A . Both transmitting and receiving ports agree on the number of buffers available during port login
- B . Negotiation occurs between an E_Port and an F_Port, and between two N_Ports
- C . Credit value is incremented when a frame is transmitted and decremented upon receiving a response
- D . Receiver Ready (R_RDY) is sent from the receiving port if available credits reach zero
Which of the following are key characteristics of Big Data? (Choose two)
- A . Variety
- B . Velocity
- C . Veracity
- D . Vulnerability
Which iSCSI host connectivity option is recommended in a CPU-intensive application environment?
- A . NIC with software-based iSCSI initiator
- B . TCP offload engine
- C . iSCSI HBA
- D . Converged Network Adapter
What is an accurate statement about the Network File System (NFS) protocol?
- A . Provides a set of remote procedure calls to access a remote file system
- B . Uses the server message block protocol to provide file locking capability
- C . Translates block I/O requests from a file system into object-level requests
- D . Automatically scales the file systems on clients as the workload increases
In an object-based storage system, which elements are associated with an object?
- A . Metadata, object ID, attributes, and file path
- B . Metadata, LUN ID, data, and object ID
- C . Object ID, attributes, LUN ID, and file path
- D . Metadata, object ID, data, and attributes
Based on the exhibit, what does the "X" represent in the FCIP tunnel configuration?
- A . E_port
- B . EX_port
- C . F_port
- D . VE_port
A service provider is offering cloud services to Enterprise P and Enterprise Q.
Which cloud deployment model does the exhibit represent?
- A . Externally-hosted private cloud
- B . On-premise community cloud
- C . Public cloud
- D . Externally-hosted community cloud
Which process is represented in the graphic?
- A . Concatenation
- B . Partitioning
- C . Striping
- D . Shredding
What is a key advantage of cloning a virtual machine (VM)?
- A . Ability to run new VMs simultaneously with the same IP address.
- B . Reduces the time required to create multiple copies of a VM.
- C . Improves the performance of an existing VM and new VMs.
- D . Eliminates the need to create multiple snapshots for a VM.
In a Fibre Channel SAN environment, what does the term "N_Port" refer to?
- A . A node port that connects an end device to a switch
- B . A switch port that connects to another switch
- C . A port on a storage device
- D . A port on a host bus adapter
An organization wants to protect data from accidental deletion, application crashes, data corruption, and disaster.
Which solution should the organization adopt?
- A . Storage tiering
- B . Thin provisioning
- C . Data archiving
- D . Data backup
An organization has several virtual machines (VMs) deployed in their data center. The VM files are stored on a block-based storage system. The applications on the VMs are impacted during VM backup because the backup agents on the VMs are consuming a large amount of resources.
Which alternate backup solution is recommended to address this issue?
- A . Image-based backup
- B . Three-way NDMP backup
- C . Two-way NDMP backup
- D . Target-based deduplication backup
An organization performs a full back up of its data every week. However, they are experiencing long backup windows and high network bandwidth consumption during the backup process.
Which type of deduplication should be deployed to reduce the backup window and network bandwidth consumption?
- A . Source-based
- B . Target-based
- C . Inline
- D . File-based target
What is an accurate statement about three-way NDMP backup in a NAS environment?
- A . Backup data is sent directly from NAS to the backup device
- B . Backup data is sent to the backup device through the application servers
- C . A dedicated backup device is required for each NAS
- D . All NAS systems should have the same operating environment
Which of the following are key fault tolerance techniques? (Choose two)
- A . RAID
- B . Data deduplication
- C . Load balancing
- D . Data archiving
What is an accurate statement about an FCoE environment?
- A . FC Forwarder must split an FC frame into two or more FCoE frames based on the Ethertype
- B . FCoE controller sends RSCNs to all nodes to provide access control
- C . FCoE ASIC encapsulates FCoE frames into FC frames based on FC-to-FCoE mapping
- D . FCoE network must be configured to support jumbo frames for optimal performance
What is the time taken by the platter of a hard disk drive to position data under the read/write head?
- A . Data transfer rate
- B . Rotational latency
- C . Disk service time
- D . Seek time
What is an accurate statement about the application streaming technique of application virtualization?
- A . Application is downloaded in portions on the client for local execution
- B . Application executes remotely and its user interface is transmitted to the client
- C . Application executes on the client without the use of a locally-installed agent
- D . Application is converted into a standalone package that directly executes on the client
Refer to the exhibit.
What type of Fibre Channel port does the “X” represent?
- A . N_port
- B . F_port
- C . E_port
- D . NL_port
Which technology combines NAND flash memory into a hard disk drive and is a single, integrated device incorporating both types of storage?
- A . Solid-state drive
- B . Dual drive
- C . Fibre Channel drive
- D . Solid-state hybrid drive
What triggers an appropriate workflow upon receiving a service provisioning or management request?
- A . Alerts
- B . Orchestrated operations
- C . Recovery time objective
- D . Infrastructure discovery
Why is it important for organizations to implement a backup solution in a data center environment?
- A . Improve the integrity of critical data
- B . Ensure the availability of production data
- C . Minimize the cost of data protection
- D . Reduce redundant data in a production environment
Which process groups multiple physical drives and presents them to a compute system as a single logical volume?
- A . Concatenation
- B . Partitioning
- C . Striping
- D . Orchestration
What is a benefit of source-based deduplication over target-based deduplication?
- A . Backup data can be retained longer
- B . Only unique data is sent over the network to be backed up
- C . Backup processing is offloaded from the backup client
- D . Less backup data is stored on the backup server
A Fibre Channel switch has eight ports and all ports must be operational 24×7.
However, a failure of Port 5 occurs on a particular week as follows:
– Monday = 11 AM to 12 PM
– Thursday = 7 AM to 11 AM
– Saturday = 11 AM to 1 PM
What is the availability of Port 5 in that week?
- A . 93%
- B . 94.1%
- C . 95.8%
- D . 97%
What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?
- A . Utilizes preconfigured preinstalled and prepackaged vendor ready solutions
- B . Combines the datacenter components into a single standalone computing platform managed by software
- C . Utilizes products and services from the vendors that provide specific functions with more configuration options
- D . Combines datacenter components into a distributed infrastructure platform managed by software
What does the "X" represent in the graphic?
- A . E_port
- B . F_port
- C . G_port
- D . N_port
Which of the following are characteristics of block storage? (Choose two)
- A . Accessible via SMB and NFS
- B . Treated as an independent disk drive
- C . Accessed as raw storage volumes
- D . Best suited for unstructured data
What is an accurate statement about Zoning?
- A . FC switch ports, FC HBA ports, and storage ports should not be members of multiple zones
- B . Nodes that are distributed across multiple switches in a switched fabric may also be grouped into the same zone
- C . Increases the amount of fabric-management traffic within a zone by sending RSCNs to all nodes in a fabric
- D . Multiple zone sets may be defined in a fabric and all zone sets must be active at a time
What is an accurate statement about VLANs and VSANs in an FCoE environment with an existing FC SAN?
- A . A dedicated VLAN must be configured for each VSAN
- B . VLANs configured for VSANs must carry regular LAN traffic
- C . Default VLAN must map to all VSANs defined in the FCoE switch
- D . A minimum of four VLANs must be created to isolate VSAN traffic
What is determined based on the recovery point objective in an asynchronous remote replication?
- A . Size of the buffer
- B . Size of the replica
- C . Response time
- D . Location of the source
What is an accurate statement about full volume replication?
- A . Target device is at least as large as the source device
- B . Target device requires only a fraction of the space used by the source device
- C . Target device is accessible only after the replication session starts
- D . Target and source devices should be on different storage arrays
What is a benefit of link aggregation?
- A . Optimizes fabric performance by distributing network traffic across ISLs.
- B . Improves ISL utilization by increasing the network traffic on a specific ISL.
- C . Yields a higher throughput by combining two parallel ISLs into a single physical ISL.
- D . Saves bandwidth by restricting traffic to a specific potentially congested ISL.
A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.
What type of data protection method is this called?
- A . Image-based
- B . Backup as a service
- C . Agent-based
- D . Local replication